Exploiting refactoring in formal verification release_b76qgyfyfbcfbgnos4wer2w2ly

by Xiang Yin, John Knight, Westley Weimer

Published in Dependable Systems and Networks by IEEE.

2009   p53-62

Archived Files and Locations

application/pdf   240.8 kB
file_yugmqbopprf63ij27nbtlvjnt4
application/pdf   242.8 kB
file_oeo3e2m3ojce7bz3mjs6tdefoi
web.archive.org (webarchive)
www.cs.virginia.edu (web)
application/pdf   465.5 kB
file_vci3dxkq2zc7jcgoyypnfvudhm
web.archive.org (webarchive)
www.cs.virginia.edu (web)
application/pdf   236.2 kB
file_nihckosynrgaja5a5tej7d7c6e
web.archive.org (webarchive)
web.eecs.umich.edu (web)
application/pdf   455.7 kB
file_gs3uda4c5jctfhv4xxepjd4we4
web.archive.org (webarchive)
core.ac.uk (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
www.cs.virginia.edu (web)
+ 3 more URLs
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2009
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 511ac0ff-8ee4-4c18-b442-a50ec546ab7e
API URL: JSON